cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
☆1,244Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆555Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,140Updated 10 months ago
- 📚 A curated list of awesome Docker security resources☆683Updated 2 months ago
- ☆570Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,176Updated this week
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆490Updated 2 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,003Updated 2 months ago
- A curated list of awesome CI CD security resources☆611Updated 9 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,137Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,461Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆897Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆684Updated 2 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,042Updated last month
- Dangerously fast DNS/network/port scanner☆913Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,098Updated 4 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,129Updated last year
- Checklist for container security - devsecops practices☆1,589Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,251Updated 3 years ago
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.☆1,571Updated 3 years ago
- all paths lead to clouds☆638Updated last year
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆815Updated 5 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,402Updated last year
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,189Updated 3 months ago
- A Blazing fast Security Auditing tool for Kubernetes☆1,001Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,255Updated 9 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆599Updated 2 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆752Updated 3 years ago
- ☆364Updated 2 years ago